A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems
Abstract
:1. Introduction
- (1)
- Reliability and Resilience of Power Networks: Microgrids have the potential to disconnect from the primary grid and operate in “island mode,” utilizing their local energy generation and storage systems, which allows them to continue working in times of emergency or power outages.
- (2)
- Increased Renewable Energy Integration: Microgrids are a more sustainable and environmentally friendly choice for energy generation since they can include many renewable energy sources, such as solar panels and wind turbines.
- (3)
- Improved Energy Efficiency: The central management system of a microgrid regulates the energy demand of the connected loads and coordinates the output of the various energy sources, resulting in the more effective use of energy resources and lower energy expenditures.
- (4)
- Enhanced Grid Stability: Microgrids can complement the primary electrical grid by supplying extra capacity during high demand and lessening the burden on the central grid, boosting the stability and reliability of the entire power system.
- (5)
- Local Control and Ownership: Microgrids are commonly owned by local communities or facilities, giving them more control over their energy supply and reducing their dependence on centralized power systems.
- Normal operation mode: when the networked microgrid system is connected to the primary power distribution network.
- Emergency operation mode: when the networked microgrid system is functioning independently or when, after a power outage, it assists in restoring service by starting up on its own.
- We provide a comprehensive overview of networked microgrids in terms of the architectures, control strategies, challenges and benefits, and standards and regulations of NMGs.
- We present a detailed review of the most widely used communication technologies and protocols in NMGs, including the requirements for appropriate functioning and their impact.
- We provide a critical review of cybersecurity attacks on NMGs, including case studies reported in the literature.
- We also provide a detailed review of mitigation techniques to prevent cyberattacks.
2. Networked Microgrid Architectures, Controls, and Standards/Regulations
2.1. Architecture of NMGs
2.2. Control of NMGs
- (1)
- Centralized Control:
- (2)
- Decentralized Control:
- (3)
- Distributed Control:
- (4)
- Hierarchical Control:
2.2.1. Primary Control
2.2.2. Secondary Control
2.2.3. Tertiary Control
2.3. Protection of NMGs
2.4. Benefits and Challenges of NMGs
2.5. Economics and Resiliency Aspects of NMGs
2.6. Standards and Regulations of NMGs
3. Networked Microgrid Communications
3.1. Communication Requirements for Smart Grid Systems
- Latency: Latency can be described as the time in which data move between two points in a communication network inside a smart grid. The capacity of a smart grid to successfully control and manage the flow of energy is impacted by latency, which is a crucial component of the smart grid’s operation. Low latency is necessary for real-time applications such as demand response, grid monitoring, and power system safety because it helps the grid run effectively and consistently.
- Reliability: Communication reliability is the capacity of a smart grid’s communication system to send data precisely and reliably. As it guarantees the proper operation of the grid’s different elements, including distribution systems, renewable energy sources, and energy storage systems, it is a critical component of the smart grid. Reliable communication is provided in the smart grid by using redundant communication channels, algorithms for error detection and correction, and routine testing and maintenance of the communication network.
- Bandwidth: The smart grid communication network’s bandwidth requirements must be determined since they directly impact the choice of transmission media (fiber optics, radio waves, and coaxial cables) and communication technology (e.g., 3G, LTE, and WiMAX). It is crucial to remember that if suitable precautions are not followed, the communication system’s numerous endpoints could result in unmanageable bandwidth requirements [98].
- QoS: The ability of the communication network to transmit the required information with the desired degree of dependability, performance, and security is ensured by the quality of service (QoS), which is a crucial requirement for smart grid communication. Data transmission must be quick, dependable, secure, and consistent across the smart grid communication network [99].
- Scalability: Scalability is the capacity of a network or system to change to meet growing demand and to increase its capacity as necessary. Scalability is a crucial requirement for smart grid communication because the network must manage an increasing number of connected devices, an increase in data volume, and technological advances. Since the needs of the smart grid system are constantly changing, this requires a flexible and straightforward upgradable communication network [100].
- Interoperability: Interoperability is necessary for smart grid communication for different gadgets, systems, and applications to collaborate efficiently. The communication system of the smart grid should be able to link to preexisting legacy systems and newer systems and technologies without much alteration. Interoperability is critical to ensuring that different gadgets, systems, and applications can interact and transfer information, allowing for more advanced features, such as surveillance, control, and real-time data analysis [101]. To achieve interoperability, open standards and protocols such as IEC 61850 and IEC 60870-5-104 must be used to ensure that communication systems are created with modular and adaptable structures.
- Security: Security is a critical component of the smart grid’s communication infrastructure since it defends the sensitive data acquired from various elements from both physical and virtual threats. Most SG apps place a high premium on ensuring end-to-end security [102]. Security measures must be immediately integrated into the communication network rather than added as an afterthought.
- Standardization is crucial to the smart grid communication system since it ensures interconnection and compatibility across different components and systems. Communication protocols, technologies, and interfaces must be standardized to facilitate the smooth integration of various components and systems, enabling efficient and effective communication.
3.2. Smart Grid Communication Technologies
3.2.1. Wired Communication
- Power Line Communication (PLC)
- Ethernet
- Optical Fiber Communication
- Serial Communication
3.2.2. Wireless Communication
- Cellular Communications
- Zigbee
- Wi-Fi
- LoRaWAN (Long-Range Wide-Area Network)
3.3. Impact of Communication on Networked Microgrid Systems
3.4. Communication Protocols and Standards
- IEC 61850IEC 61850 was initially introduced in 2003 to integrate various components within a grid, such as protection devices, sensors, and control systems. It aims to enhance interoperability and flexibility by providing a standardized interface between various devices and systems [119,120,121]. The IEC 61850 standard is divided into several parts, each defining a specific protocol aspect. These include:
- System Aspects (IEC 61850-1, IEC 61850-2, IEC 61850-3, IEC 61850-4, and IEC 61850-5): These parts outline the general and particular subjects and specifications for communications in a substation. They cover issues such as device information sharing and substation topology in addition to the communication network.
- Configuration (IEC 61850-6): Based on the XML schema, this part describes configuring Intelligent Electronic Devices (IEDs) compatible with IEC 61850. The SCL offers a standardized method for defining a substation’s logical and physical elements and the communication links that connect them.
- ACSI (Abstract Communication Service Interface): This is a crucial part of the IEC 61850 standard in power grid automation systems. This interface is split into four sections, each with a specific communication and data-handling function.
- IEC 61850-7-1: Specifies the fundamental models of information that the system utilizes, including information on switching, status, and measurement data.
- IEC 61850-7-2: Specifies the abstract services utilized in the system to manipulate and manage data, enabling compatibility across heterogeneous hardware and software.
- IEC 61850-7-3: Outlines the typical data classes utilized inside the systems, including data types and communication services.
- IEC 61850-7-4: Describes the concept of logical nodes, which are data object abstractions used to describe the functions and data of a system uniformly.
- Mapping sections (IEC 61850-8 and IEC 61850-9) explain how information is mapped and exchanged between systems using one of the mapping methods (protocol stacks) outlined in the IEC 61850 standard.
- Testing (IEC 61850-10): This document specifies a testing procedure to ensure that gadgets adhere to the IEC 61850 standard. The ability of devices from various manufacturers to function together seamlessly depends on this.
- DNP3
- Modbus
- OPC UA
- MQTT
- AMQP
- CoAP
- BACnet
4. Networked Microgrid Cybersecurity
4.1. Cyberattacks in Smart Grids
- Jamming Attacks
- Man-in-The-Middle Attacks
- Eavesdrop on a conversation violates confidentiality.
- Compromise integrity through communication interception and message modification.
- Force one of the parties to stop communicating by intercepting and eradicating messages or altering messages, interfering with availability.
- False Data Injection Attacks
- Spoofing Attacks
- Flooding Attacks
- Puppet Attacks
- Masquerade Attacks
- Distributed Denial-Of-Service Attack
- Network layer attacks involve flooding the target system with traffic to target the network bandwidth and infrastructure.
- Transport layer attacks target network protocols such as TCP or UDP by exploiting flaws in how packets are transmitted.
- Application layer attacks involve sending many requests to a specific application or service, such as a web server or a database, that the server cannot manage.
4.2. Cyberattack Vulnerabilities in Networked Microgrids
4.3. Techniques for Detecting Cyberattacks on Smart Grids
- Filtering-Based Techniques
- Intrusion Detection System
- Prediction Models
- AI-Based Techniques
- Localization-Based Techniques
4.4. Techniques for Mitigating Cyberattacks on Smart Grids
- Prevention-Based Mitigation techniques
- Secure Protocols and StandardsSecure protocols are crucial for smart grid networks to transmit data securely and accurately. Some examples of these protocols include secure DNP3, IPsec, TLS, and SSL. In contrast to TLS and SSL, which offer authentication and encryption at the transport layer, IPsec offers both at the network layer. Numerous applications, such as online transactions and remote access VPNs, use these protocols regularly.One of the most popular protocols for facilitating interactions among remote terminal units (RTUs) and control centers in the context of the smart grid is DNP3 (Distributed Network Protocol). However, by default, DNP3 lacks any security features, which leaves it open to intrusions. As a result, secure DNP3 became available to offer message integrity protection, authentication, and encryption. Secure DNP3 incorporates security features, including user identification, message authentication, encryption, and key management, to defend against various incidents, such as replay attacks, man-in-the-middle attacks, and eavesdropping [168].Various security protocols were studied to enhance the security and integrity of data transmission in smart grid systems. For example, the IEEE 802.11i protocol and smart grid secure protocol (SGSP) were proposed in [169,170,171]. These protocols include data integrity, confidentiality, and additional authentication.
- Cryptographic and AuthenticationSmart grid networks commonly use cryptographic and authentication methods as defenses against cyberattacks. Cryptography provides secure communication and confidentiality by encrypting sensitive data and restricting access. Additionally, it guarantees integrity and authenticity by using digital signatures and hashing algorithms to check the accuracy of the data and confirm the sender’s identity. Authentication mechanisms are essential for verifying consumer and device identities and ensuring that only authorized parties can access sensitive systems and data.
- Intrusion PreventionIt is crucial to stop or eliminate illegal activity in the network to improve the performance of smart grids. Using firewalls and antivirus software is a classic method for achieving this. Although they are not a perfect solution, firewalls and antivirus software are crucial tools for safeguarding against attacks on smart grids. Utilizing additional security measures, such as intrusion detection and prevention systems (IDS/IPS), is advised. In [172], firewalls are defined as either hardware or software systems that can keep an eye on network activity using a variety of protocols. Firewalls and antivirus software, however, cannot stop complex or unknown cyberattacks. Other security measures have been suggested for this purpose, including network data loss prevention (DLP), intrusion prevention systems (IPSs), security information and event management systems (SIEMs), file integrity monitoring (FIM), and automated security compliance, to lessen or prevent the effects of cyberattacks on the network. Data loss prevention (DLP) is a method of protection that monitors and regulates the transfer of data within a company’s network to detect and stop data breaches. Data transfers, messages, and other network activities can all be watched by DLP systems to identify and stop sensitive data from exiting the network, whether on purpose or accidentally.An IPS, a network security technology, performs the real-time detection and prevention of network intrusions. It is an advanced intrusion detection system (IDS) that recognizes malicious network activity but does nothing to stop it. By obstructing network traffic or discarding malicious packets, an IPS, on the other hand, can identify and halt malicious network activity.A security technology called SIEM gathers and analyzes security events from various sources to provide an overview of a company’s security posture. SIEM can collect data from network servers and other security systems. Moreover, FIM is a security method to spot unauthorized alterations to essential files and system settings. To spot any unauthorized activity, FIM systems can monitor file additions, deletions, changes, and access permissions. This aids in detecting and preventing cyberattacks that target the integrity of files and systems.
- Security Training/EducationSecurity and technical countermeasures are only sufficient to assure complete protection for the system or smart grid if periodic training and education are provided to employees and customers, which can be crucial in preventing cyberattacks. Most companies, utilities, and universities require crews and employees to take cyberattack awareness training as it is crucial in preventing cyberattacks and ensuring complete protection for the system or smart grid. The authors of [173] recommend that utility companies provide security courses or programs to their employees. These training sessions cover social engineering, phishing, password management, and the value of updating firmware and software.
- Access Control and Cybersecurity PoliciesSeveral efficient tactics, such as attribute-based or policy-based access control, can control access privileges in smart grid networks. Employees who have been permitted to do so define the authorization policies that other employees and users must follow to receive approval, thereby preventing physical or digital attacks.
- Protection-Based Mitigation techniques
- Spread-Spectrum TechniquesIn order to defend against jamming attacks, smart grid networks frequently employ the spread-spectrum techniques known as frequency-hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS). FHSS abruptly shifts a signal’s transmission frequency across several channels, whereas DSSS multiplies the signal with a noise-like sign to spread it across a larger bandwidth. Both methods ensure that jamming attacks cannot easily disrupt or intercept the transmission signal. The FHSS technique is suggested in [174,175] as a defense against jamming and collision attacks on the smart grid network. This method employs a broader bandwidth than a single carrier frequency to ensure security. The authors of [176] assert that FHSS techniques have several benefits, including efficient management of the multipath effect.
- Game-Theory-Based TechniquesMathematical models incorporating strategic decision-making interactions are known as game-theory-based techniques. Game theory has been applied to the development of false data injection attack prevention methods in the framework of smart grid security. The authors of [177] proposed a two-layer game theory method for optimizing the allocation of different defense resources using information from multiple sources. A cost-effective and efficient approach for large-scale power systems and the infrastructure of the smart grid was provided by another study [178], which suggested a game theory model depending on the minimax regret method.
4.5. Policies and Awareness Training
5. Conclusions
Funding
Conflicts of Interest
References
- Microgrids—Center for Climate and Energy Solutions. Available online: https://www.c2es.org/content/microgrids/ (accessed on 3 May 2023).
- Choudhury, S. A comprehensive review on issues, investigations, control and protection trends, technical challenges and future directions for Microgrid technology. Int. Trans. Electr. Energy Syst. 2020, 30, e12446. [Google Scholar] [CrossRef]
- Bullich-Massagué, E.; Díaz-González, F.; Aragüés-Peñalba, M.; Girbau-Llistuella, F.; Olivella-Rosell, P.; Sumper, A. Microgrid clustering architectures. Appl. Energy 2018, 212, 340–361. [Google Scholar] [CrossRef]
- Kou, P.; Liang, D.; Gao, L. Distributed EMPC of multiple microgrids for coordinated stochastic energy management. Appl. Energy 2017, 185, 939–952. [Google Scholar] [CrossRef]
- Wu, X.; Xu, Y.; Wu, X.; He, J.; Guerrero, J.M.; Liu, C.C.; Schneider, K.; Ton, D.T. A Two-Layer Distributed Control Method for Islanded Networked Microgrid Systems. IEEE Trans. Smart Grid 2019, 11, 942–957. [Google Scholar] [CrossRef]
- Bayati, N.; Savaghebi, M. Protection Systems for DC Shipboard Microgrids. Energies 2021, 14, 5319. [Google Scholar] [CrossRef]
- Backhaus, S.N.; Dobriansky, L.; Glover, S.; Liu, C.C.; Looney, P.; Mashayekh, S.; Pratt, A.; Schneider, K.; Stadler, M.; Starke, M.; et al. Networked Microgrids Scoping Study; Los Alamos National Lab. (LANL): Los Alamos, NM, USA, 2016. [Google Scholar] [CrossRef]
- Li, Z.; Xu, Y.; Fang, S.; Zheng, X.; Feng, X. Robust Coordination of a Hybrid AC/DC Multi-Energy Ship Microgrid with Flexible Voyage and Thermal Loads. IEEE Trans. Smart Grid 2020, 11, 2782–2793. [Google Scholar] [CrossRef]
- Venkataramanan, V.; Mallikeswaran, A.; Srivastava, A. Analysis of aircraft electric microgrid system with Auxiliary Power Unit using real time simulation. IEEE Int. Symp. Ind. Electron. 2015, 2015, 245–250. [Google Scholar] [CrossRef]
- Mashayekh, S.; Stadler, M.; Cardoso, G.; Heleno, M.; Madathil, S.C.; Nagarajan, H.; Bent, R.; Mueller-Stoffels, M.; Lu, X.; Wang, J. Security-Constrained Design of Isolated Multi-Energy Microgrids. IEEE Trans. Power Syst. 2018, 33, 2452–2462. [Google Scholar] [CrossRef]
- Microgrids and Active Distribution Networks. Available online: http://www.farzadrazavi.com/files/Courses/microgrid/902/bookiee.pdf (accessed on 5 April 2023).
- P1814/D14, Jan 2018—IEEE Draft Recommended Practice for Electrical System Design Techniques to Improve Electrical Safety. 2018. Available online: https://ieeexplore.ieee.org/document/8295083 (accessed on 5 April 2023).
- Meliani, M.; El Barkany, A.; El Abbassi, I.; Darcherif, A.M.; Mahmoudi, M. Energy management in the smart grid: State-of-the-art and future trends. Int. J. Eng. Bus. Manag. 2021, 13, 18479790211032920. [Google Scholar] [CrossRef]
- Li, Y.; Zhao, T.; Wang, P.; Gooi, H.B.; Wu, L.; Liu, Y.; Ye, J. Optimal operation of multimicrogrids via cooperative energy and reserve scheduling. IEEE Trans. Ind. Inform. 2018, 14, 3459–3468. [Google Scholar] [CrossRef]
- Mo, X.; Zhu, J.; Chen, J.; Guo, Y.; Xia, Y.; Liu, M. A Stochastic Spatiotemporal Decomposition Decision-Making Approach for Real-Time Dynamic Energy Management of Multi-Microgrids. IEEE Trans. Sustain. Energy 2021, 12, 821–833. [Google Scholar] [CrossRef]
- Li, J.; Khodayar, M.E.; Wang, J.; Zhou, B. Data-Driven Distributionally Robust Co-Optimization of P2P Energy Trading and Network Operation for Interconnected Microgrids. IEEE Trans. Smart Grid 2021, 12, 5172–5184. [Google Scholar] [CrossRef]
- Liu, Y.; Gooi, H.B.; Li, Y.; Xin, H.; Ye, J. A secure distributed transactive energy management scheme for multiple interconnected microgrids considering misbehaviors. IEEE Trans. Smart Grid 2019, 10, 5975–5986. [Google Scholar] [CrossRef]
- Kounev, V.; Tipper, D.; Yavuz, A.A.; Grainger, B.M.; Reed, G.F. A Secure Communication Architecture for Distributed Microgrid Control. IEEE Trans. Smart Grid 2015, 6, 2484–2492. [Google Scholar] [CrossRef]
- Carli, R.; Dotoli, M.; Pellegrino, R. A Hierarchical Decision-Making Strategy for the Energy Management of Smart Cities. IEEE Trans. Autom. Sci. Eng. 2017, 14, 505–523. [Google Scholar] [CrossRef]
- Dai, S.; Gao, F.; Guan, X.; Yan, C.-B.; Liu, K.; Dong, J.; Yang, L. Robust Energy Management for a Corporate Energy System with Shift-Working V2G. IEEE Trans. Autom. Sci. Eng. 2021, 18, 650–667. [Google Scholar] [CrossRef]
- Clegg, S.; Mancarella, P. Integrated Electrical and Gas Network Flexibility Assessment in Low-Carbon Multi-Energy Systems. IEEE Trans. Sustain. Energy 2016, 7, 718–731. [Google Scholar] [CrossRef]
- Yan, B.; Luh, P.B.; Warner, G.; Zhang, P. Operation and Design Optimization of Microgrids with Renewables. IEEE Trans. Autom. Sci. Eng. 2017, 14, 573–585. [Google Scholar] [CrossRef]
- Hatziargyriou, N. Microgrids: Architectures and Control; Wiley-IEEE Press: Piscataway, NJ, USA, 2013. [Google Scholar]
- Han, Y.; Zhang, K.; Li, H.; Coelho, E.A.A.; Guerrero, J.M. MAS-Based Distributed Coordinated Control and Optimization in Microgrid and Microgrid Clusters: A Comprehensive Overview. IEEE Trans. Power Electron. 2018, 33, 6488–6508. [Google Scholar] [CrossRef] [Green Version]
- Wang, Y.; Chen, C.; Wang, J.; Baldick, R. Research on Resilience of Power Systems under Natural Disasters—A Review. IEEE Trans. Power Syst. 2016, 31, 1604–1613. [Google Scholar] [CrossRef]
- Wang, Z.; Wang, J. Self-Healing Resilient Distribution Systems Based on Sectionalization into Microgrids. IEEE Trans. Power Syst. 2015, 30, 3139–3149. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, B.; Wang, J.; Chen, C. Networked microgrids for self-healing power systems. IEEE Trans. Smart Grid 2016, 7, 310–319. [Google Scholar] [CrossRef]
- Chen, C.; Wang, J.; Qiu, F.; Zhao, D. Resilient Distribution System by Microgrids Formation after Natural Disasters. IEEE Trans. Smart Grid 2016, 7, 958–966. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, B.; Wang, J.; Begovic, M.M.; Chen, C. Coordinated energy management of networked microgrids in distribution systems. IEEE Trans. Smart Grid 2015, 6, 45–53. [Google Scholar] [CrossRef]
- Al-Attiyah, S.; Majumder, R. Nested Microgrids: Operation and Control Requirements. In Proceedings of the CIRED 2018 Ljubljana Workshop, Ljubljana, Slovenia, 7–8 June 2018. [Google Scholar]
- Chen, B.; Wang, J.; Lu, X.; Chen, C.; Zhao, S. Networked Microgrids for Grid Resilience, Robustness, and Efficiency: A Review. IEEE Trans. Smart Grid 2021, 12, 18–32. [Google Scholar] [CrossRef]
- Islam, M.; Yang, F.; Amin, M. Control and optimisation of networked microgrids: A review. IET Renew. Power Gener. 2021, 15, 1133–1148. [Google Scholar] [CrossRef]
- Liu, G.; Starke, M.R.; Ollis, B.; Xue, Y. Networked Microgrids Scoping Study. 2016. Available online: http://www.osti.gov/scitech/ (accessed on 8 April 2023).
- Saha, D.; Bazmohammadi, N.; Vasquez, J.C.; Guerrero, J.M. Multiple Microgrids: A Review of Architectures and Operation and Control Strategies. Energies 2023, 16, 600. [Google Scholar] [CrossRef]
- Zou, H.; Mao, S.; Wang, Y.; Zhang, F.; Chen, X.; Cheng, L. A Survey of Energy Management in Interconnected Multi-Microgrids. IEEE Access 2019, 9, 72158–72169. [Google Scholar] [CrossRef]
- Loukarakis, E.; Dent, C.J.; Bialek, J.W. Decentralized multi-period economic dispatch for real-time flexible demand management. IEEE Trans. Power Syst. 2016, 31, 672–684. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Li, Y.; Gooi, H.B.; Jian, Y.; Xin, H.; Jiang, X.; Pan, J. Distributed Robust Energy Management of a Multimicrogrid System in the Real-Time Energy Market. IEEE Trans. Sustain. Energy 2019, 10, 396–406. [Google Scholar] [CrossRef]
- Garcia-Torres, F.; Bordons, C.; Tobajas, J.; Marquez, J.J.; Garrido-Zafra, J.; Moreno-Munoz, A. Optimal Schedule for Networked Microgrids under Deregulated Power Market Environment Using Model Predictive Control. IEEE Trans. Smart Grid 2021, 12, 182–191. [Google Scholar] [CrossRef]
- Mehri Arsoon, M.; Moghaddas-Tafreshi, S.M. Peer-to-peer energy bartering for the resilience response enhancement of networked microgrids. Appl. Energy 2020, 261, 114413. [Google Scholar] [CrossRef]
- Chen, J.; Chen, C.; Duan, S. Cooperative Optimization of Electric Vehicles and Renewable Energy Resources in a Regional Multi-Microgrid System. Appl. Sci. 2019, 9, 2267. [Google Scholar] [CrossRef] [Green Version]
- Nguyen, H.K.; Khodaei, A.; Han, Z. A big data scale algorithm for optimal scheduling of integrated microgrids. IEEE Trans. Smart Grid 2018, 9, 274–282. [Google Scholar] [CrossRef]
- Hussain, A.; Bui, V.H.; Kim, H.M. Robust Optimization-Based Scheduling of Multi-Microgrids Considering Uncertainties. Energies 2016, 9, 278. [Google Scholar] [CrossRef] [Green Version]
- Nikmehr, N.; Najafi Ravadanegh, S. Reliability evaluation of multi-microgrids considering optimal operation of small scale energy zones under load-generation uncertainties. Int. J. Electr. Power Energy Syst. 2016, 78, 80–87. [Google Scholar] [CrossRef]
- John, T.; Lam, S.P. Voltage and frequency control during microgrid islanding in a multi-area multi-microgrid system. IET Gener. Transm. Distrib. 2017, 11, 1502–1512. [Google Scholar] [CrossRef]
- Zhang, Q.; Dehghanpour, K.; Wang, Z.; Huang, Q. A Learning-Based Power Management Method for Networked Microgrids under Incomplete Information. IEEE Trans. Smart Grid 2020, 11, 1193–1204. [Google Scholar] [CrossRef] [Green Version]
- Liu, W.; Gu, W.; Wang, J.; Yu, W.; Xi, X. Game theoretic non-cooperative distributed coordination control for multi-microgrids. IEEE Trans. Smart Grid 2018, 9, 6986–6997. [Google Scholar] [CrossRef]
- Rahbar, K.; Chai, C.C.; Zhang, R. Real-time energy management for cooperative microgrids with renewable energy integration. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2014; pp. 25–30. [Google Scholar] [CrossRef]
- Alam, M.N.; Chakrabarti, S.; Ghosh, A. Networked Microgrids: State-of-the-Art and Future Perspectives. IEEE Trans. Ind. Inform. 2019, 15, 1238–1250. [Google Scholar] [CrossRef]
- Scattolini, R. Architectures for distributed and hierarchical Model Predictive Control—A review. J. Process Control 2009, 19, 723–731. [Google Scholar] [CrossRef]
- Du, Y.; Wang, Z.; Liu, G.; Chen, X.; Yuan, H.; Wei, Y.; Li, F. A cooperative game approach for coordinating multi-microgrid operation within distribution systems. Appl. Energy 2018, 222, 383–395. [Google Scholar] [CrossRef] [Green Version]
- Ouammi, A.; Dagdougui, H.; Dessaint, L.; Sacile, R. Coordinated Model Predictive-Based Power Flows Control in a Cooperative Network of Smart Microgrids. IEEE Trans. Smart Grid 2015, 6, 2233–2244. [Google Scholar] [CrossRef]
- Meng, L.; Shafiee, Q.; Trecate, G.F.; Karimi, H.; Fulwani, D.; Lu, X.; Guerrero, J.M. Review on Control of DC Microgrids and Multiple Microgrid Clusters. IEEE J. Emerg. Sel. Top. Power Electron. 2017, 5, 928–948. [Google Scholar] [CrossRef] [Green Version]
- Yan, L.; Sheikholeslami, M.; Gong, W.; Shahidehpour, M.; Li, Z. Architecture, Control, and Implementation of Networked Microgrids for Future Distribution Systems. J. Mod. Power Syst. Clean Energy 2022, 10, 286–299. [Google Scholar] [CrossRef]
- Ahmethodzic, L.; Music, M. Comprehensive review of trends in microgrid control. Renew. Energy Focus 2021, 38, 84–96. [Google Scholar] [CrossRef]
- Siddique, A.B.; Munsi, M.S.; Sarker, S.K.; Das, S.K.; Islam, M.R. Voltage and current control augmentation of islanded microgrid using multifunction model reference modified adaptive PID controller. Int. J. Electr. Power Energy Syst. 2019, 113, 492–501. [Google Scholar] [CrossRef]
- Siddique, A.B.; Munsi, S.; Sarker, S.K.; Das, S.K.; Islam, R. Trends in microgrid control. IEEE Trans. Smart Grid 2014, 5, 1905–1919. [Google Scholar] [CrossRef]
- Baghaee, H.R.; Mirsalim, M.; Gharehpetian, G.B. Power Calculation Using RBF Neural Networks to Improve Power Sharing of Hierarchical Control Scheme in Multi-DER Microgrids. IEEE J. Emerg. Sel. Top. Power Electron. 2016, 4, 1217–1225. [Google Scholar] [CrossRef]
- Sun, Y.; Hou, X.; Yang, J.; Han, H.; Su, M.; Guerrero, J.M. New Perspectives on Droop Control in AC Microgrid. IEEE Trans. Ind. Electron. 2017, 64, 5741–5745. [Google Scholar] [CrossRef] [Green Version]
- Li, L.; Han, Y.; Yang, P.; Huang, Q.; Zhang, Z.; Xu, Y. A New Distributed Control Strategy for DC Microgrids with Droop Coefficient Correction and DC Bus Voltage Restoration. In Proceedings of the 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), Chengdu, China, 21–24 May 2019. [Google Scholar]
- Hoa Thi Pham, X. Power sharing strategy in islanded microgrids using improved droop control. Electr. Power Syst. Res. 2020, 180, 106164. [Google Scholar] [CrossRef]
- Babazadeh-Dizaji, R.; Hamzeh, M.; Hekmati, A. A frequency-based economical-sharing strategy for low-voltage DC microgrids. Int. J. Electr. Power Energy Syst. 2020, 118, 105822. [Google Scholar] [CrossRef]
- Cook, M.D.; Trinklein, E.H.; Parker, G.G.; Robinett, R.D.; Weaver, W.W. Optimal and decentralized control strategies for inverter-based AC microgrids. Energies 2019, 12, 3529. [Google Scholar] [CrossRef] [Green Version]
- Li, F.; Lin, Z.; Qian, Z.; Wu, J. Active DC bus signaling control method for coordinating multiple energy storage devices in DC microgrid. In Proceedings of the 2017 IEEE Second International Conference on DC Microgrids (ICDCM), Nuremburg, Germany, 27–29 June 2017; pp. 221–226. [Google Scholar] [CrossRef] [Green Version]
- Li, M.; Matas, J.; El Mariachet, J.; Branco, C.G.C.; Guerrero, J.M. A Fast Power Calculation Algorithm for Three-Phase Droop-Controlled-Inverters Using Combined SOGI Filters and Considering Nonlinear Loads. Energies 2022, 15, 7360. [Google Scholar] [CrossRef]
- El Mariachet, J.; Matas, J.; Martín, H.; Li, M.; Guan, Y.; Guerrero, J.M. A power calculation algorithm for single-phase droop-operated-inverters considering linear and nonlinear loads HIL-assessed. Electronics 2019, 8, 1366. [Google Scholar] [CrossRef] [Green Version]
- El Mariachet, J.; Guan, Y.; Matas, J.; Martín, H.; Li, M.; Guerrero, J.M. Hil-assessed fast and accurate single-phase power calculation algorithm for voltage source inverters supplying to high total demand distortion nonlinear loads. Electronics 2020, 9, 1643. [Google Scholar] [CrossRef]
- Bakhshi-Jafarabadi, R.; Sadeh, J. New voltage feedback-based islanding detection method for grid-connected photovoltaic systems of microgrid with zero non-detection zone. IET Renew. Power Gener. 2020, 14, 1710–1719. [Google Scholar] [CrossRef]
- Praiselin, W.J.; Belwin Edward, J. A review on impacts of power quality, control and optimization strategies of integration of renewable energy based microgrid operation. Int. J. Intell. Syst. Appl. 2018, 10, 67–81. [Google Scholar] [CrossRef] [Green Version]
- Hernández-González, G.; Iravani, R. Current injection for active islanding detection of electronically-interfaced distributed resources. IEEE Trans. Power Deliv. 2006, 21, 1698–1705. [Google Scholar] [CrossRef]
- Yilmaz, A.; Bayrak, G. An improved CWT-based islanding detection method for a developed microgrid in real-time. Mugla J. Sci. Technol. 2020, 6, 10–17. [Google Scholar] [CrossRef]
- Banerjee, S.; Bhowmik, P.S. Transient Disturbances and Islanding Detection in Micro Grid using Discrete Wavelet Transform. In Proceedings of the 2020 IEEE Calcutta Conference (CALCON), Kolkata, India, 28–29 February 2020; pp. 396–401. [Google Scholar] [CrossRef]
- Paiva, S.C.; Ribeiro, R.L.D.A.; Alves, D.K.; Costa, F.B.; Rocha, T.D.O.A. A wavelet-based hybrid islanding detection system applied for distributed generators interconnected to AC microgrids. Int. J. Electr. Power Energy Syst. 2020, 121, 106032. [Google Scholar] [CrossRef]
- Yamashita, D.Y.; Vechiu, I.; Gaubert, J.P. A review of hierarchical control for building microgrids. Renew. Sustain. Energy Rev. 2020, 118, 109523. [Google Scholar] [CrossRef]
- Peyghami, S.; Mokhtari, H.; Davari, P.; Loh, P.C.; Blaabjerg, F. On Secondary Control Approaches for Voltage Regulation in DC Microgrids. IEEE Trans. Ind. Appl. 2017, 53, 4855–4862. [Google Scholar] [CrossRef] [Green Version]
- Andishgar, M.H.; Gholipour, M.; Hooshmand, R.-A. Improved secondary control for optimal unbalance compensation in islanded microgrids with parallel DGs. Int. J. Electr. Power Energy Syst. 2020, 116, 105535. [Google Scholar] [CrossRef]
- Shafiee, Q.; Dragičević, T.; Vasquez, J.C.; Guerrero, J.M. Hierarchical control for multiple DC-microgrids clusters. IEEE Trans. Energy Convers. 2014, 29, 922–933. [Google Scholar] [CrossRef] [Green Version]
- Peyghami, S.; Mokhtari, H.; Loh, P.C.; Davari, P.; Blaabjerg, F. Distributed Primary and secondary power sharing in a droop-controlled lvdc microgrid with merged AC and DC characteristics. IEEE Trans. Smart Grid 2018, 9, 2284–2294. [Google Scholar] [CrossRef] [Green Version]
- Hu, J.; Bhowmick, P. A consensus-based robust secondary voltage and frequency control scheme for islanded microgrids. Int. J. Electr. Power Energy Syst. 2020, 116, 105575. [Google Scholar] [CrossRef]
- Feng, W.; Jin, M.; Liu, X.; Bao, Y.; Marnay, C.; Yao, C.; Yu, J. A review of microgrid development in the United States—A decade of progress on policies, demonstrations, controls, and software tools. Appl. Energy 2018, 228, 1656–1668. [Google Scholar] [CrossRef]
- Shahidehpour, M.; Li, Z.; Bahramirad, S.; Li, Z.; Tian, W. Networked microgrids. IEEE Power Energy Mag. 2017, 15, 63–71. [Google Scholar] [CrossRef]
- Abhishek, A.; Ranjan, A.; Devassy, S.; Kumar Verma, B.; Ram, S.K.; Dhakar, A.K. Review of hierarchical control strategies for DC microgrid. IET Renew. Power Gener. 2020, 14, 1631–1640. [Google Scholar] [CrossRef]
- Meng, L.; Dragicevic, T.; Guerrero, J.M.; Vasquez, J.C. Optimization with system damping restoration for droop controlled DC-DC converters. In Proceedings of the 2013 IEEE Energy Conversion Congress and Exposition, Denver, CO, USA, 15–19 September 2013; pp. 65–72. [Google Scholar] [CrossRef] [Green Version]
- Krishna Vedulla, L.; Mishra, M.K. PSO Based Power Sharing Scheme for an Islanded DC Microgrid System. In Proceedings of the IECON 2017—43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017. [Google Scholar]
- Baskar, S.; Alphones, A.; Suganthan, P.M.; Liang, J.J. Design of Yagi-Uda antennas using comprehensive learning particle swarm optimisation. IEE Proc. Microw. Antennas Propag. 2005, 152, 340–346. [Google Scholar] [CrossRef]
- Burgos-Mellado, C.; Llanos, J.J.; Cardenas, R.; Saez, D.; Olivares, D.E.; Sumner, M.; Costabeber, A. Distributed Control Strategy Based on a Consensus Algorithm and on the Conservative Power Theory for Imbalance and Harmonic Sharing in 4-Wire Microgrids. IEEE Trans. Smart Grid 2020, 11, 1604–1619. [Google Scholar] [CrossRef]
- Alam, M.N.; Gokaraju, R.; Chakrabarti, S. Protection coordination for networked microgrids using single and dual setting overcurrent relays. IET Gener. Transm. Distrib. 2020, 14, 2818–2828. [Google Scholar] [CrossRef]
- Alam, M.N.; Chakrabarti, S.; Pradhan, A.K. Protection of Networked Microgrids Using Relays with Multiple Setting Groups. IEEE Trans. Ind. Inform. 2022, 18, 3713–3723. [Google Scholar] [CrossRef]
- Mirsaeidi, S.; Dong, X.; Said, D.M. Towards hybrid AC/DC microgrids: Critical analysis and classification of protection strategies. Renew. Sustain. Energy Rev. 2018, 90, 97–103. [Google Scholar] [CrossRef]
- Cintuglu, M.H.; Ishchenko, D. Secure Distributed State Estimation for Networked Microgrids. IEEE Internet Things J. 2019, 6, 8046–8055. [Google Scholar] [CrossRef]
- Liu, G.; Starke, M.; Xiao, B.; Zhang, X.; Tomsovic, K. Microgrid optimal scheduling with chance-constrained islanding capability. Electr. Power Syst. Res. 2017, 145, 197–206. [Google Scholar] [CrossRef] [Green Version]
- Liu, G.; Ollis, T.B.; Xiao, B.; Zhang, X.; Tomsovic, K. Networked Microgrids for Improving Economics and Resiliency. IEEE Power Energy Soc. Gen. Meet. 2018, 2018, 1–5. [Google Scholar] [CrossRef] [Green Version]
- Liu, G.; Ollis, T.B.; Ferrari, M.F.; Sundararajan, A.; Tomsovic, K. Robust Scheduling of Networked Microgrids for Economics and Resilience Improvement. Energies 2022, 15, 2249. [Google Scholar] [CrossRef]
- 1547-2018—IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces. 2018. Available online: https://ieeexplore.ieee.org/document/8332112 (accessed on 25 April 2023).
- 2030-2011–IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS), End-Use Applications, and Loads. Available online: https://ieeexplore.ieee.org/document/6018239 (accessed on 25 April 2023).
- Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication Technologies for Smart Grid: A Comprehensive Survey. Sensors 2021, 21, 8087. [Google Scholar] [CrossRef]
- Pérez-Guzmán, R.E.; Salgueiro-Sicilia, Y.; Rivera, M. Communication systems and security issues in smart microgrids. In Proceedings of the 2017 IEEE Southern Power Electronics Conference (SPEC), Puerto Varas, Chile, 4–7 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Department of Energy Communications Requirements of Smart Grid Technologies. 2010. Available online: https://energy.gov/sites/prod/files/2010%20Smart%20Grid%20System%20Report.pdf (accessed on 1 May 2023).
- Daoud, M.; Fernando, X.; Daoud, M.; Fernando, X. On the Communication Requirements for the Smart Grid. Energy Power Eng. 2011, 3, 53–60. [Google Scholar] [CrossRef] [Green Version]
- Jeon, Y.-H. QoS Requirements for the Smart Grid Communications System. 2011. Available online: https://www.researchgate.net/publication/268049923_QoS_Requirements_for_the_Smart_Grid_Communications_System (accessed on 3 May 2023).
- Kim, Y.J.; Lee, J.; Atkinson, G.; Kim, H.; Thottan, M. SeDAX: A scalable, resilient, and secure platform for smart grid communications. IEEE J. Sel. Areas Commun. 2012, 30, 1119–1136. [Google Scholar] [CrossRef]
- Smart Grid Communications: QoS Stovepipes or QoS Interoperability? Available online: https://www.researchgate.net/publication/228871156_Smart_Grid_Communications_QoS_Stovepipes_or_QoS_Interoperability (accessed on 3 May 2023).
- Li, H.; Lai, L.; Zhang, W. Communication requirement for reliable and secure state estimation and control in smart grid. IEEE Trans. Smart Grid 2011, 2, 476–486. [Google Scholar] [CrossRef]
- Rua, D.; Moura Pereira, L.F.; Gil, N.; Peças Lopes, J.A. Impact of multi-Microgrid Communication systems in islanded operation. In Proceedings of the 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Manchester, UK, 5–7 December 2011. [Google Scholar] [CrossRef] [Green Version]
- Parikh, P.P.; Kanabar, M.G.; Sidhu, T.S. Opportunities and challenges of wireless communication technologies for smart grid applications. In Proceedings of the IEEE PES General Meeting, Minneapolis, MN, USA, 25–29 July 2010. [Google Scholar] [CrossRef]
- Aderibole, A.O.; Saathoff, E.K.; Kircher, K.J.; Leeb, S.B.; Norford, L.K. Power Line Communication for Low-Bandwidth Control and Sensing. IEEE Trans. Power Deliv. 2022, 37, 2172–2181. [Google Scholar] [CrossRef]
- Girotto, M.; Tonello, A.M. EMC Regulations and Spectral Constraints for Multicarrier Modulation in PLC. IEEE Access 2017, 5, 4954–4966. [Google Scholar] [CrossRef]
- Miller, D.; Mirzaeva, G.; Townsend, C.D.; Goodwin, G.C. The Use of Power Line Communication in Standalone Microgrids. IEEE Trans. Ind. Appl. 2021, 57, 3029–3037. [Google Scholar] [CrossRef]
- Kocak, A.Y.; Taplamacioglu, M.C.; Gozde, H. General overview of area networks and communication technologies in smart grid applications. Int. J. Tech. Phys. Probl. Eng. 2021, 13, 103–110. [Google Scholar]
- Kuzlu, M.; Pipattanasomporn, M. Assessment of communication technologies and network requirements for different smart grid applications. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013. [Google Scholar] [CrossRef]
- Hendriana, Y.; Hardi, R. Remote control system as serial communications mobile using a microcontroller. In Proceedings of the 2016 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, 24–27 October 2016. [Google Scholar] [CrossRef]
- Wen, C.; Jiang, Z. The 32nd Chinese Control and Decision Conference [Conference Reports]. In IEEE Control Systems Magazine; volume 41, 1, pp. 86–92. February 2021. [Google Scholar] [CrossRef]
- Baimel, D.; Tapuchi, S.; Baimel, N. Smart grid communication technologies-overview, research challenges and opportunities. In Proceedings of the 2016 International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), Capri, Italy, 22–24 June 2016; pp. 116–120. [Google Scholar] [CrossRef]
- Xu, B.; Mou, K. Institute of Electrical and Electronics Engineers. Beijing Section and Institute of Electrical and Electronics Engineers. In Proceedings of the 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC 2019), Chengdu, China, 20–22 December 2019. [Google Scholar]
- Amity University; Institute of Electrical and Electronics Engineers; Institute of Electrical and Electronics Engineers; United Kingdom and Republic of Ireland Section. In Proceedings of the 2020 International Conference on Intelligent Engineering and Management (ICIEM-2020), London, UK, 17–19 June 2020.
- Sidhu, B.; Singh, H.; Chhabra, A. Emerging Wireless Standards—WiFi, ZigBee and WiMAX. World Acad. Sci. Eng. Technol. 2007, 2007, 308–313. [Google Scholar]
- Kaushik, S. An Overview of Technical Aspect for WiFi Networks Technology. Available online: www.ijecse.org (accessed on 16 May 2023).
- Schroder Filho, H.G.; Pissolato Filho, J.; Moreli, V.L. The adequacy of LoRaWAN on smart grids: A comparison with RF mesh technology. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, 12–15 September 2016. [Google Scholar] [CrossRef]
- Sandoval, R.M.; Garcia-Sanchez, A.J.; Garcia-Haro, J. Optimizing and updating lora communication parameters: A machine learning approach. IEEE Trans. Netw. Serv. Manag. 2019, 16, 884–895. [Google Scholar] [CrossRef]
- Oliveira-Lima, J.A.; Delgado-Gomes, V.; Martins, J.F.; Lima, C. Standard-based service-oriented infrastructure to integrate intelligent buildings in distributed generation and smart grids. Energy Build. 2014, 76, 450–458. [Google Scholar] [CrossRef]
- Ustun, T.S.; Ozansoy, C.; Zayegh, A. Recent developments in microgrids and example cases around the world—A review. Renew. Sustain. Energy Rev. 2011, 15, 4030–4041. [Google Scholar] [CrossRef]
- Alizadeh, S.M.; Ozansoy, C. The role of communications and standardization in wind power applications—A review. Renew. Sustain. Energy Rev. 2016, 54, 944–958. [Google Scholar] [CrossRef]
- Cebe, M.; Akkaya, K. A bandwidth-efficient secure authentication module for smart grid DNP3 protocol. In Proceedings of the 2020 Resilience Week (RWS), Salt Lake City, UT, USA, 19–23 October 2020; pp. 160–166. [Google Scholar] [CrossRef]
- Darwish, I.; Igbe, O.; Celebi, O.; Saadawi, T.; Soryal, J. Smart Grid DNP3 Vulnerability Analysis and Experimentation. In Proceedings of the 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, USA, 3–5 November 2015; pp. 141–147. [Google Scholar] [CrossRef]
- Ferst, M.K.; De Figueiredo, H.F.M.; Denardin, G.; Lopes, J. Implementation of Secure Communication with Modbus and Transport Layer Security protocols. In Proceedings of the 2018 13th IEEE International Conference on Industry Applications (INDUSCON), Sao Paulo, Brazil, 12–14 November 2018. [Google Scholar]
- Available online: https://modbus.org/ (accessed on 17 May 2023).
- Nasiri, A.; Bani-Ahmed, A.; Stamenkovic, I. Foundational Support Systems of the Smart Grid: State of the Art and Future Trends. Int. J. Smart Grid 2 2018, 2, 1–12. [Google Scholar] [CrossRef]
- Muštra, M.; Vuković, J.; Zovko-Cihlar, B. State Complexity Reduction in Reinforcement Learning based Adaptive Traffic Signal Control. In Proceedings of the 62nd International Symposium ELMAR-2020, Zadar, Croatia, 14–15 September 2020. [Google Scholar]
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
- Messaging Technologies for the Industrial Internet and the Internet of Things Whitepaper. 2017. Available online: www.adlinktech.com (accessed on 17 May 2023).
- Katsikas, S.; Cuppens, F.; Cuppens, N.; Lambrinoudakis, C.; Kalloniatis, C.; Mylopoulos, J.; Antón, A.; Gritzalis, S.; Pallas, F.; Pohle, J.; et al. (Eds.) Computer Security. In Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 11980. [Google Scholar] [CrossRef]
- Esquivel-Vargas, H.; Caselli, M.; Peter, A. Automatic deployment of specification-based intrusion detection in the BACnet protocol. In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy; Association for Computing Machinery: New York, NY, USA, 2017; pp. 25–36. [Google Scholar] [CrossRef]
- Sun, C.C.; Hahn, A.; Liu, C.C. Cyber security of a power grid: State-of-the-art. Int. J. Electr. Power Energy Syst. 2018, 99, 45–56. [Google Scholar] [CrossRef]
- Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector Mission Support Center Analysis Report. 2016. Available online: https://nsarchive.gwu.edu/sites/default/files/documents/3705441/Idaho-National-Laboratory-Cyber-Threat-and.pdf (accessed on 20 May 2023).
- Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
- Conti, M.; Dragoni, N.; Lesyk, V. A Survey of Man in the Middle Attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
- Prowell, S.; Kraus, R.; Borkin, M. Seven Deadliest Network Attacks; ScienceDirect: Amsterdam, The Netherlands, 2010. [Google Scholar] [CrossRef]
- Rahman, M.A.; Mohsenian-Rad, H. False Data Injection Attacks with Incomplete Information against Smart Power Grids. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012. [Google Scholar]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 1–33. [Google Scholar] [CrossRef]
- Xie, L.; Mo, Y.; Sinopoli, B. False Data Injection Attacks in Electricity Markets. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 226–231. [Google Scholar] [CrossRef]
- Thakre, P.; Jaiswal, A.N.; Karale, S.J. Survey Paper on Spoofing Detection in Wireless Network. Available online: www.ijert.org (accessed on 3 May 2023).
- Bedi, G.; Venayagamoorthy, G.K.; Singh, R.; Brooks, R.R.; Wang, K.C. Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet Things J. 2018, 5, 847–870. [Google Scholar] [CrossRef]
- Yi, P.; Zhu, T.; Zhang, Q.; Wu, Y.; Pan, L. Puppet attack: A denial of service attack in advanced metering infrastructure network. J. Netw. Comput. Appl. 2016, 59, 325–332. [Google Scholar] [CrossRef] [Green Version]
- Bhuse, V.; Gupta, A.; Al-Fuqaha, A. Detection of Masquerade Attacks on Wireless Sensor Networks. In Proceedings of the 2007 IEEE International Conference on Communications, Glasgow, UK, 24–28 June 2007. [Google Scholar]
- Wang, K.; Yu, J.; Yu, Y.; Qian, Y.; Zeng, D.; Guo, S.; Xiang, Y.; Wu, J. A survey on energy internet: Architecture, approach, and emerging technologies. IEEE Syst. J. 2018, 12, 2403–2416. [Google Scholar] [CrossRef]
- Wang, K.; Shao, Y.; Shu, L.; Zhu, C.; Zhang, Y. Mobile big data fault-tolerant processing for ehealth networks. IEEE Netw. 2016, 30, 36–42. [Google Scholar] [CrossRef]
- Bashar, S.; Ding, Z.; Xiao, C. On the secrecy rate of multi-antenna wiretap channel under finite-alphabet input. IEEE Commun. Lett. 2011, 15, 527–529. [Google Scholar] [CrossRef]
- Salahdine, F.; Kaabouch, N. Social engineering attacks: A survey. Future Internet 2019, 11, 89. [Google Scholar] [CrossRef] [Green Version]
- Liao, H.J.; Lin, C.H.R.; Lin, Y.C.; Tung, K.Y. Intrusion detection system: A comprehensive review. J. Netw. Comput. Appl. 2013, 36, 16–24. [Google Scholar] [CrossRef]
- Vu, T.V.; Nguyen, B.H.; Ngo, T.A.; Steurer, M.; Schoder, K.; Hovsapian, R. Distributed optimal dynamic state estimation for cyber intrusion detection in networked DC microgrids. In Proceedings of the IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; Volume 1, pp. 4050–4055. [Google Scholar]
- Geneiatakis, D.; Vrakas, N.; Lambrinoudakis, C. Utilizing bloom filters for detecting flooding attacks against SIP based services. Comput. Secur. 2009, 28, 578–591. [Google Scholar] [CrossRef]
- IKhan, A.; Pi, D.; Khan, Z.U.; Hussain, Y.; Nawaz, A. Hml-ids: A hybrid-multilevel anomaly prediction approach for intrusion detection in scada systems. IEEE Access 2019, 7, 89507–89521. [Google Scholar] [CrossRef]
- Chekired, D.A.; Khoukhi, L.; Mouftah, H.T. Fog-Based Distributed Intrusion Detection System against False Metering Attacks in Smart Grid. IEEE Int. Conf. Commun. 2019, 2019, 1–6. [Google Scholar] [CrossRef]
- Lysenko, S.; Bobrovnikova, K.; Shchuka, R.; Savenko, O. A Cyberattacks Detection Technique Based on Evolutionary Algorithms. In Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 14–18 May 2020; pp. 127–132. [Google Scholar] [CrossRef]
- Sakhnini, J.; Karimipour, H.; Dehghantanha, A. Smart Grid Cyber Attacks Detection Using Supervised Learning and Heuristic Feature Selection. In Proceedings of the 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2019. [Google Scholar] [CrossRef] [Green Version]
- Kozitsin, V.; Katser, I.; Lakontsev, D. Online forecasting and anomaly detection based on the ARIMA model. Appl. Sci. 2021, 11, 3194. [Google Scholar] [CrossRef]
- Bécue, A.; Praça, I.; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 2021, 54, 3849–3886. [Google Scholar] [CrossRef]
- Tufail, S.; Batool, S.; Sarwat, A.I. False data injection impact analysis in AI-based smart grid. In Proceedings of the SoutheastCon 2021, Atlanta, GA, USA, 10–13 March 2021. [Google Scholar] [CrossRef]
- Hussain, F.; Abbas, S.G.; Husnain, M.; Fayyaz, U.U.; Shahzad, F.; Shah, G.A. IoT DoS and DDoS Attack Detection using ResNet. In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 5–7 November 2020. [Google Scholar] [CrossRef]
- Wang, J.; Tu, W.; Hui, L.C.K.; Yiu, S.M.; Wang, E.K. Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2246–2251. [Google Scholar] [CrossRef]
- Khoei, T.T.; Aissou, G.; Hu, W.C.; Kaabouch, N. Ensemble Learning Methods for Anomaly Intrusion Detection System in Smart Grid. In Proceedings of the 2021 IEEE International Conference on Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 14–15 May 2021; pp. 129–135. [Google Scholar] [CrossRef]
- Sowah, R.A.; Ofori-Amanfo, K.B.; Mills, G.A.; Koumadi, K.M. Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). J. Comput. Netw. Commun. 2019, 2019, 4683982. [Google Scholar] [CrossRef] [Green Version]
- Prasad, G.; Huo, Y.; Lampe, L.; Leung, V.C. Machine learning based physical-layer intrusion detection and location for the smart grid. IEEE Communications Society; Institute of Electrical and Electronics Engineers. In Proceedings of the 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21–23 October 2019. [Google Scholar]
- Camana Acosta, M.R.; Ahmed, S.; Garcia, C.E.; Koo, I. Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks. IEEE Access 2020, 8, 19921–19933. [Google Scholar] [CrossRef]
- Salahdine, F.; Kaabouch, N. Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey. Phys. Commun. 2020, 39, 101001. [Google Scholar] [CrossRef]
- Zafari, F.; Gkelias, A.; Leung, K.K. A Survey of Indoor Localization Systems and Technologies. IEEE Commun. Surv. Tutor. 2019, 21, 2568–2599. [Google Scholar] [CrossRef] [Green Version]
- Peng, R.; Sichitiu, M.L. Angle of arrival localization for wireless sensor networks. In Proceedings of the 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, USA, 28 September 2006; pp. 374–382. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Derhab, A.; Janicke, H. Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Telecommun. Syst. 2019, 73, 317–348. [Google Scholar] [CrossRef] [Green Version]
- El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef] [Green Version]
- Attia, M.; Senouci, S.M.; Sedjelmaci, H.; Aglzim, E.H.; Chrenko, D. An efficient Intrusion Detection System against cyber-physical attacks in the smart grid. Comput. Electr. Eng. 2018, 68, 499–512. [Google Scholar] [CrossRef]
- Jo, H.J.; Yoon, J.W. A new countermeasure against brute-force attacks that use high performance computers for big data analysis. Int. J. Distrib. Sens. Netw. 2015, 2015, 406915. [Google Scholar] [CrossRef]
- Guo, Z.; Ni, Y.; Wong, W.S.; Shi, L. Time Synchronization Attack and Countermeasure for Multisystem Scheduling in Remote Estimation. IEEE Trans. Automat. Contr. 2021, 66, 916–923. [Google Scholar] [CrossRef]
- Nezhad, S.M.T.; Nazari, M.; Gharavol, E.A. A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks. IEEE Commun. Lett. 2016, 20, 700–703. [Google Scholar] [CrossRef]
- Leszczyna, R. Standards with cybersecurity controls for smart grid—A systematic analysis. Int. J. Commun. Syst. 2019, 32, e3910. [Google Scholar] [CrossRef]
- El Mouaatamid, O. Internet of Things Security: Layered Classification of Attacks and Possible Countermeasures. Available online: https://www.researchgate.net/publication/321905085_Internet_of_Things_Security_Layered_classification_of_attacks_and_possible_Countermeasures (accessed on 4 May 2023).
- Usman, M.; Raponi, S.; Qaraqe, M.; Oligeri, G. KaFHCa: Key-establishment via Frequency Hopping Collisions. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021. [Google Scholar] [CrossRef]
- Guidelines for Smart Grid Cybersecurity; National Institute of Standards and Technology, U.S. Department of Commerce: Gaithersburg, MD, USA, 2014. [CrossRef]
- Desmedt, Y.; Safavi-Naini, R.; Wang, H.; Charnes, C.; Pieprzyk, J. Broadcast anti-jamming systems. Comput. Netw. 2001, 35, 223–236. [Google Scholar] [CrossRef]
- Pickholtz, R.L.; Schilling, D.L.; Milstein, L.B. Theory of Spread-Spectrum Communications—A Tutorial. IEEE Trans. Commun. 1982, 30, 855–884. [Google Scholar] [CrossRef] [Green Version]
- Clemente, J.F. Naval Postgraduate School Monterey, California Thesis Cyber Security for Critical Energy Infrastructure. 2018. Available online: https://apps.dtic.mil/sti/citations/AD1065277 (accessed on 20 May 2023).
- Kaspersky Lab. The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within. Kaspersky. Tratto da Kaspersky Daily.—Google Search. 2018. Available online: https://www.google.com/search?q=Kaspersky+Lab.+%2C+2018.+The+Human+Factor+in+IT+Security%3A+How+Employees+are+Making+Businesses+Vulnerable+from+Within.+Kaspersky.+Tratto+da+Kaspersky+daily.&rlz=1C1CHBF_enUS986US986&oq=Kaspersky+Lab.+%2C+2018.+The+Human+Factor+in+IT+Security%3A+How+Employees+are+Making+Businesses+Vulnerable+from+Within.+Kaspersky.+Tratto+da+Kaspersky+daily.&aqs=chrome..69i57.519j0j7&sourceid=chrome&ie=UTF-8 (accessed on 10 June 2023).
- ENISA Threat Landscape 2020—Data Breach—ENISA. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2020-data-breach (accessed on 10 June 2023).
- Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manag. 2019, 45, 13–24. [Google Scholar] [CrossRef]
- Metke, A.R.; Ekl, R.L. Security technology for smart grid networks. IEEE Trans. Smart Grid 2010, 1, 99–107. [Google Scholar] [CrossRef]
- Vellaithurai, C.; Srivastava, A.; Zonouz, S. SeCPSim: A training simulator for cyber-power infrastructure security. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 61–66. [Google Scholar] [CrossRef]
- Henze, M.; Bader, L.; Filter, J.; Lamberts, O.; Ofner, S.; Van Der Velde, D. Cybersecurity Research and Training for Power Distribution Grids—A Blueprint. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, Online, 9–13 November 2020; pp. 2097–2099. [Google Scholar] [CrossRef]
Networked Microgrid Architecture | Advantages | Disadvantages | References |
---|---|---|---|
Radial topology |
|
| [38,39] |
Daisy-chain topology |
|
| [40,41] |
Mesh topology |
|
| [42] |
Ring formation |
|
| [43,44,45] |
Serial microgrid on a single distribution feeder |
|
| [46] |
Interconnected microgrids on multiple distribution feeders |
|
| [47] |
Grid-series-interconnected microgrids |
|
| [3] |
Standard | Description |
---|---|
IEEE 1547.1 (2005) | Details the test methods for the equipment that connects the DERs to the power grid. |
IEEE 1547.2 (2008) | Includes guidance for the use of IEEE standards during interconnection. |
IEEE 1547.3 (2007) | Creates guidelines for inspection, exchange of information, and DER control with an electrical network. |
IEEE 1547.4 (2011) | Provides design, operation, and integration guidelines for DER island systems with utility networks. |
IEEE 1547.6 (2011) | Defines the standards for connecting the power system’s secondary network to DREs. |
IEEE 1547.7 (2013) | Outlines the operational actions required to assess the impact of DERs on the power system. |
IEEE 1547.8 (2014) | Suggests identifying and expanding new design and operational processes to fully exploit DERs and power systems. |
IEEE 2030.1 | Provides guidance for electric-powered transportation infrastructure. |
IEEE 2030.2 (2015) | Focuses on the integration of HESS associated with electric power infrastructure, in addition to end-use applications and loads. |
IEEE 2030.3 (2015) | Specifies the test technique for electric energy storage systems used in power systems. |
IEEE 2030.6 (2016) | Describes a framework for monitoring the effects and evaluating the comprehensive benefits of demand response programs. |
IEEE 2030.7 (2017) | Provides technical specifications and requirements for microgrid controllers. |
IEEE 2030.8 (2018) | Defines testing standards for MG controllers for energy management. |
IEEE 2030.9 (2018) | Offers guidance for microgrid planning and designing. |
IEEE 2030.10 | Highlights the DC MGs’ design, operation, and maintenance for urban and rural applications. |
Standard | Description |
---|---|
IEEE 519-92 | Describes the harmonic specifications and conditions of the power system |
IEEE 1159-95 | Specifies the power quality requirements for power systems |
IEEE 1100-99 | Suggests the needed specifications for grounding and powering sensitive electronic devices |
IEC 61000-2-2 | Provides compatibility rates in industrial plants for low-frequency conducted disturbances |
IEC 61000-3-2 | Lists limitations of harmonic current emissions |
IEC 61000-4-15 | Deals with flicker and fluctuation specifications |
IEC 50160 | Defines distribution systems’ voltage specifications |
Current Harmonics | |||
---|---|---|---|
Standards | Harmonic Order | Limit | THD |
IEEE 1547 | (odd) | ||
(even) | |||
IEC 61000-3-2 | (odd) | ||
(even) | |||
Voltage Harmonics | |||
Standards | Voltage Level (kV) | Harmonic Limit | THD |
IEC | 1% | 1.5% | |
1.5% | 2.5% | ||
3% | 5% | ||
IEEE 519 | 1% | 1.5% | |
1.5% | 2.5% | ||
3% | 5% | ||
5% | 8% |
Comm Technology | Type | Data Rate | Range | Security | Cost | Applications | Advantages | Disadvantages |
---|---|---|---|---|---|---|---|---|
PLC | Wired | 2–500 Mbps | Varies | High | Low/moderate | Smart grid, home automation, building automation | Uses existing electrical wiring, reducing installation costs. | Performance can be affected by noise and signal attenuation in power lines. |
Ethernet | Wired | 10 Mbps–100 Gbps | 100 m | High | Low/moderate | Industrial control, data centers, offices | High data rates and low latency. | Limited range compared to wireless technologies. |
Fiber optic | Wired | 5–40 Gbps | 40 km/ up to 10 km | High | Expensive | Data centers, high-speed internet, long-distance communication | Very high data rates and long-distance capabilities. | Expensive installation and equipment costs. |
Serial Com | Wired | 110 bps–4 Mbps | 15 m | Low | Low | Industrial control, automation, IoT | Simple and cost-effective for short-range communication | Limited data rates and range. |
Cellular Com | Wireless | 5 Gbps and beyond | Long distance | High | Expensive | Smart grid, distribution automation, IoT | Wide coverage and long-distance capabilities. | Relatively high cost and power consumption compared to other wireless technologies. |
Zigbee | Wireless | 20–250 kbps | 10–100 m | Low | Low | Smart homes, industrial automation, IoT | Low power consumption. | Limited data rates and range. |
Wi-Fi | Wireless | 54 Mbps–10 Gbps | 100 m | Medium | Moderate/expensive | Home and office networks, public hotspots, IoT devices | High data rates and wide availability. | Limited range compared to some other wireless technologies. |
LoRaWAN | Wireless | 0.3–50 kbps | 2–5 km (urban)/15 km (rural) | Medium to High | Low/moderate | Smart agriculture, smart cities, smart homes, IoT devices | Long-range communication capabilities. Low power consumption. | Lower data rates, relatively high latency. |
Attack Type | Description | Target | Threat Size | Impact |
---|---|---|---|---|
Jamming Attacks | Intentional interference with wireless communication signals renders them unusable | Wireless communication | Small to large | Loss of service, decreased productivity, revenue loss |
Man-in-the-Middle Attacks | Intercepting and manipulating communication between two parties without their knowledge | Wireless or wired networks | Small to large | Loss of service, decreased productivity, revenue loss |
False Data Injection | Injecting false or fabricated data into a communication stream or database | Internet of Things (IoT) | Small to large | Stolen credentials, data theft, identity theft |
Spoofing Attacks | Faking the identity of a person, device, or network to gain unauthorized access or mislead a target | Computer or network | Small to medium | Unauthorized access, data theft or manipulation, system disruption |
Flooding Attacks | Overwhelming a network or system with traffic, rendering it unusable or causing it to crash | Website or network | Small to large | Service downtime, network congestion, loss of data |
Puppet Attacks | Malware that infects and takes control of a targeted device or network, turning it into a puppet that the attacker can remotely control | IoT or network | Small to large | Unauthorized access, data theft or manipulation, system disruption |
Masquerade Attacks | Pretending to be a legitimate user, device, or application to gain unauthorized access or privileges | Computer or network | Small to medium | Unauthorized access, data theft or manipulation, system disruption |
Distributed Denial-of-Service Attacks | Coordinating a large number of devices or systems to flood a target with traffic, overwhelming its ability to respond and rendering it unusable | Website or network | Large | Service downtime, network congestion, loss of data |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aghmadi, A.; Hussein, H.; Polara, K.H.; Mohammed, O. A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems. Inventions 2023, 8, 84. https://doi.org/10.3390/inventions8040084
Aghmadi A, Hussein H, Polara KH, Mohammed O. A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems. Inventions. 2023; 8(4):84. https://doi.org/10.3390/inventions8040084
Chicago/Turabian StyleAghmadi, Ahmed, Hossam Hussein, Ketulkumar Hitesh Polara, and Osama Mohammed. 2023. "A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems" Inventions 8, no. 4: 84. https://doi.org/10.3390/inventions8040084
APA StyleAghmadi, A., Hussein, H., Polara, K. H., & Mohammed, O. (2023). A Comprehensive Review of Architecture, Communication, and Cybersecurity in Networked Microgrid Systems. Inventions, 8(4), 84. https://doi.org/10.3390/inventions8040084